Archive for February, 2010


Synergy is a program that will let you use one keyboard and mouse on multiple computers across a network. The computers can be running Linux, Windows, or MacOS. The computer with the keyboard and mouse is the server or host, and the computers with the displays to be controlled remotely are the clients. In this tutorial I will let you know how to get Synergy setup and running on your Ubuntu system.

On the left-hand monitor I have a Windows XP system running. On the right-hand monitor I run Ubuntu. If I move my mouse off my Windows XP monitor to the right, it shows up on the Ubuntu monitor and vice-versa. Plus cut-and-paste works between the machines as well.

Here’s how to configure Synergy with two computers. Let’s assume that you have two home machines called “windowspc” and “ubuntu”. We’ll put the Windows machine on the left and the Ubuntu machine on the right. One of the two machines will run as the Synergy server and the other will run as a Synergy client. I picked the Ubuntu machine to be the server.

Advertisements

This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.

The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.

The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias “PortSwigger”, Dafydd developed the popular Burp Suite of web application hack tools.

Here’s the resource you need if you want to apply today’s most powerful data mining techniques to meet real business challenges. Data Mining: Concepts and Techniques equips you with a sound understanding of data mining principles and teaches you proven methods for knowledge discovery in large corporate databases.
Written expressly for database practitioners and professionals, this book begins with a conceptual introduction designed to get you up to speed. This is followed by a comprehensive and state-of-the-art coverage of data mining concepts and techniques. Each chapter functions as a stand-alone guide to a critical topic, presenting proven algorithms and sound implementations ready to be used directly or with strategic modification against live data. Wherever possible, the authors raise and answer questions of utility, feasibility, optimization, and scalability, keeping your eye on the issues that will affect your project’s results and your overall success.

inSSIDer is an award-winning free Wi-Fi network scanner for Windows Vista and Windows XP. Because NetStumbler doesn’t work well with Vista and 64-bit XP, an open-source Wi-Fi network scanner was designed and built for the current generation of Windows operating systems.

What’s Unique about inSSIDer?

  • Use Windows Vista and Windows XP 64-bit.
  • Uses the Native Wi-Fi API.
  • Group by Mac Address, SSID, Channel, RSSI and “Time Last Seen.”
  • Compatible with most GPS devices (NMEA v2.3 and higher).